header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GPON Zhone R4.0.2.566b D.O.S.

This exploit is a Denial of Service (DoS) vulnerability in GPON Zhone R4.0.2.566b. It sends an evil buffer with a length of 100000 to the device, which causes it to crash. The exploit was tested on GPON Zhone 2520 with hardware 0040-48-02 and software R4.0.2.566b.

Arbitrary File Upload in articleFR CMS 3.0.5

An arbitrary file upload vulnerability exists in articleFR CMS 3.0.5. An attacker can upload a malicious file to the server by sending a specially crafted POST request to the videouploader.php file. This can be exploited to execute arbitrary PHP code on the server.

SQL injection vulnerability in articleFR CMS 3.0.5

A SQL injection vulnerability exists in articleFR CMS 3.0.5. An attacker can send a specially crafted HTTP POST request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. The vulnerable code is located in the file articleFR/system/profile.functions.php and the vulnerable parameter is username. The vulnerable query is SELECT id, username, name, password, email, website, blog, date, isactive, activekey, membership FROM users WHERE username ='[Injection HERE]'. The vulnerable function is getProfile($_username, $_connection).

IOKit Kernel Memory Disclosure Vulnerability

This vulnerability allows an attacker to read kernel memory by using the IOKit API. The vulnerability exists in the IOServiceOpen() function, which allows an attacker to open a connection to a kernel service and then use the IOConnectMapMemory() function to map kernel memory into user space. This can be used to read kernel memory, which can contain sensitive information such as passwords and encryption keys.

Exploit for CVE-2018-4233

This exploit is for CVE-2018-4233, which is an out-of-bounds read vulnerability in the IONDRVSupport kext. The vulnerability allows an attacker to read kernel memory, which can be used to gain kernel code execution. The exploit uses the leaked pointer to calculate the kernel base address and kernel slide, which can then be used to calculate the kernel text base address.

MalwareBytes Anti-Exploit Out-of-bounds Read DoS

MalwareBytes Anti-Exploit (mbae.sys) is vulnerable to an Out-of-bounds Read Denial of Service (DoS) attack. An attacker can send a specially crafted IOCTL request with a size of 0xFFFFFF00 to the vulnerable driver, which will cause the system to crash. This vulnerability affects 32bit Windows XP SP3 and Windows 7 SP1 systems running MalwareBytes Anti-Exploit version 1.03.1.1220 and 1.04.1.1012.

Privilege Escalation in RedaxScript 2.1.0

RedaxScript 2.1.0 suffers from a privilege Escalation vulnerability. The issue occurs because the application fails to properly implement access controls. The application also fails to perform proper sanity checks on the user supplied input before processing it. These two flaws led to a vertical privilege escalation. This can be achieved by a simply tampering the parameter values. An attacker can exploit this issue to gain elevated privileges to the application.

Pie Register 2.0.13 Privilege escalation

Anyone can import CSV file. Pie Register will import users from this file. After importing, the user can activate the account and reset the password. This can be done by creating a CSV file with the details of the user and then importing it using a form. The user can then activate the account using a form and reset the password using the lost password feature.

Samsung SmartViewer BackupToAvi Remote Code Execution PoC

This PoC exploits a vulnerability in Samsung SmartViewer 3.0, which allows remote code execution. The vulnerability is caused due to a boundary error in the BackupToAvi() method, which can be exploited to cause a stack-based buffer overflow by supplying a specially crafted argument. This can be exploited to execute arbitrary code by overwriting the SEH handler of the vulnerable application.

Sim Editor v6.6 Stack Based Buffer Overflow

Sim Editor v6.6 is vulnerable to a stack based buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted input that can lead to arbitrary code execution.

Recent Exploits: